-
Mattias Wadenstein (NDGF / HPC2N / ACC)09/05/2008, 09:45Networking infrastructure and computer securityWe have been using the Academic Computer Club at Umeå University as our testbed for IPv6 deployment, this includes some popular public services like a rather big free software mirror as well as workstations and multi-user machines in a semi-production environment. This talk gives an overview of the various pitfalls as well as what "just works", with some pointers on what kind of systems and...Go to contribution page
-
Matei Ciobotaru (CERN, UC Irvine, Politehnica Bucharest)09/05/2008, 10:15Networking infrastructure and computer securityWe describe the methods used to monitor and measure the performance of the Atlas TDAQ data network. The network consists of four distinct Ethernet networks interconnecting over 4000 ports using up to 200 edge switches and five multi-blade chassis. The edge networks run at 1Gbps and 10Gb/s are used for the detectors raw data flow as well as at the cores of the data flow networks. The networks...Go to contribution page
-
Romain Wartel (CERN)09/05/2008, 11:15Networking infrastructure and computer securityThis talk presents the main goals of computer security in a grid environment, by using a FAQ approach. It details the evolution of the risks in the recent years, likely objectives for attackers and the progress made by the malware toolkits and frameworks. Finally, recommendations to deal with these threats are proposed.Go to contribution page
-
Lionel Cons (CERN)09/05/2008, 11:45Networking infrastructure and computer securityAn update on recent security issues and vulnerabilities affecting Windows, Linux and Mac platforms. This talk is based on contributions and input from a range of colleagues both within and outside CERN. It covers clients, servers and control systems.Go to contribution page
-
Romain Wartel (CERN)09/05/2008, 12:15Networking infrastructure and computer securityThis talk presents common security issues with Web applications and provides some practical recommendations to users, developers, and Web services managers to mitigate the risks linked to these applications.Go to contribution page
Choose timezone
Your profile timezone: